Any kind of computer related crime such as spamming, threatening by
e-mails is considered as computer crime. Various forms of computer
related crimes are spam, fraud, witness work, insurance,
harassment, threats and various others. There are different
criminal laws that were invented to monitor or check such types of
crimes in different part of the country. Computer forensics
involves the digital evidence in support of crime to be used as
evidence. The evidence obtained should be legal, authentic, and
admissible. It is different from data recovery, work forensics and
disaster recovery in many aspects. In computer forensic we search
for an unknown data which was hidden by the suspect or user which
can be considered as a valid proof against the suspect.

Provide feedback (0)

Step 2 of 5

Two types of computer investigations
typically conducted in the corporate environment

1. E-mail abuse: E-mail abuse involves the misuse of
company’s e-mail system for personal use by sending excessive
e-mail generally to threaten or frighten the people.

It also includes transmitting the offensive messages which
creates an hostile work environment which results in an employee
filing a civil lawsuit against a company which do nothing to
prevent it.

2. Internet abuse: Internet abuse involves the misuse of
internet facility of computer by employees by using excessively for
personal use, all day surfing, watching illegal pornographic video
especially children pornography while at work.

These kinds of activity are considered as criminal act in some
jurisdictions, so computer investigator must handle these problems
with high level of professionalism.

Provide feedback (0)

Step 3 of 5

Investigation for money
embezzlement

Money embezzling is one the computer forensic crime. It is a
kind of computer crime that involves financial fraud, particularly
in small firms. Sometimes the owner is so busy that he trusts one
person to handle his work and that person take advantage of the
trust.

It involves withholding the assets for the purpose of theft by a
group of persons to whom those assets have been entrusted for
specific purposes.

In the above case the suspect was involved in the case of
embezzlement. The company needs to take a strict action against the
suspect so that he can be punished. The company needs to take the
help of different forensic companies and forensic specialists.

They are also involved in making secure the computer by finding
all the files of suspect’s computer, recovering the files that have
been deleted by the suspect, revealing the files that are hidden,
accessing the files that are encrypted, analyzing all the data, and
after that giving the expert consultation.

There are many areas where computer forensics specialists have
an important role to play, including criminal prosecutors, law
enforcement, insurance agencies, military intelligence, and
information security departments in the private sector.

Forensic companies are the companies that are involved in
solving the forensic crimes.

Provide feedback (0)

Step 5 of 5

Investigation procedure

To solve the case the investigator needs to take the help of the
professional journal and need to update it. They are required to be
updated with the modern technology. There is a great role of
professional journal in solving the forensic case.

By maintaining the professional journal the investigators can
link up the procedure that were followed while solving or
investigating the case if the case is taken to court.

It can be considered as an advantage because it eliminates the
chance of forgetting anything as everything has been recorded in
the journals.

The investigator can retrieve or can use the previously used
methods mentioned in journal if he want to solve a challenging case
or if he wants to remember how he had solved the challenging
case.

If investigator is being given the same type of case again then
he could link up the previous procedure which he had used while
solving that case it can be considered as another advantage.
Professionals can also record their personal or daily experience in
journals.

After finding the valid proofs against the suspect he was given
a strict punishment by the laws.

What is Chegg Study?

With Chegg Study, you get step-by-step solutions to the odd and even problems in your textbooks, including Guide to Computer Forensics and Investigations - 4th Editionand 9,000+ others. You can also ask subject matter experts your toughest questions 24/7.

Solutions by Chapter

Get Study Help from Chegg

Chegg is one of the leading providers of homework help for college and high school students. Get homework help and answers to your toughest questions in math, calculus, algebra, physics, chemistry, science, accounting, English and more. Master your homework assignments with our step-by-step solutions to more than 3000 textbooks. If we don't support your textbook, don't worry! You can ask a homework question and get an answer in as little as two hours. With Chegg, homework help is just a few clicks away.